National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - December 2023


0 user ratings
2023-12-12 21:15:25
milo
Red Team (CNA)

 - archive -- 
AMD divide-by-zero-day information disclosure. No-interaction MSHTML Outlook critical RCE. Double ICS critical RCE. Fewer patches for fewer products than usual.

Patch Tuesday - December 2023

Microsoft is addressing 34 vulnerabilities this December Patch Tuesday, including a single zero-day vulnerability and three critical remote code execution (RCE) vulnerabilities. December Patch Tuesday has historically seen fewer patches than a typical month, and this trend continues in 2023. This total does not include eight browser vulnerabilities published earlier this month. At time of writing, none of the vulnerabilities patched today are yet added to the CISA KEV list.

Certain AMD processors: zero-day information disclosure

This month’s lone zero-day vulnerability is CVE-2023-20588, which describes a potential information disclosure due to a flaw in certain AMD processor models as listed on the AMD advisory. AMD states that a divide-by-zero on these processor models could potentially return speculative data. AMD believes the potential impact of the vulnerability is low since local access is required; however, Microsoft ranks severity as important under its own proprietary severity scale. The vulnerability is patched at the OS level in all supported versions of Windows, even as far back as Windows Server 2008 for Azure-hosted assets participating in the Extended Security Update (ESU) program.

Outlook: no-interaction critical RCE

CVE-2023-35628 describes a critical RCE vulnerability in the MSHTML proprietary browser engine still used by Outlook, among others, to render HTML content. Of particular note: the most concerning exploitation scenario leads to exploitation as soon as Outlook retrieves and processes the specially crafted malicious email. This means that exploitation could occur before the user interacts with the email in any way; not even the Preview Pane is required in this scenario. Other attack vectors exist: the user could also click a malicious link received via email, instant message, or other medium. Assets where Internet Explorer 11 has been fully disabled are still vulnerable until patched; the MSHTML engine remains installed within Windows regardless of the status of IE11.

Internet Connection Sharing: critical RCE

This month also brings patches for a pair of critical RCE vulnerabilities in Internet Connection Sharing. CVE-2023-35630 and CVE-2023-35641 share a number of similarities: a base CVSS v3.1 score of 8.8, Microsoft critical severity ranking, low attack complexity, and presumably execution in SYSTEM context on the target machine, although the advisories do not specify execution context. Description of the exploitation method does differ between the two, however. CVE-2023-35630 requires the attacker to modify an option->length field in a DHCPv6 DHCPV6_MESSAGE_INFORMATION_REQUEST input message. Exploitation of CVE-2023-35641 is also via a maliciously crafted DHCP message to an ICS server, but the advisory gives no further clues. A broadly similar ICS vulnerability in September 2023 led to RCE in a SYSTEM context on the ICS server. In all three cases, a mitigating factor is the requirement for the attack to be launched from the same network segment as the ICS server. It seems improbable that either of this month’s ICS vulnerabilities are exploitable against a target on which ICS is not running, although Microsoft does not explicitly deny the possibility.

Holiday season update

Notable by their absence this month: no security patches for Exchange, SharePoint, Visual Studio/.NET, or SQL Server. There are also no lifecycle transitions for Microsoft products this month, although a number of Windows Server 2019 editions and Office components will transition out of mainstream support and into extended support from January 2024.

Summary Charts

Patch Tuesday - December 2023
Sharing is caring, unless it's exploitative.
Patch Tuesday - December 2023
A rare occurence: Remote Code Execution not in the top spot.
Patch Tuesday - December 2023
Fewer vulns this month overall means less variation in the heatmap.

Summary Tables

Azure vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35624Azure Connected Machine Agent Elevation of Privilege VulnerabilityNoNo7.3
CVE-2023-35625Azure Machine Learning Compute Instance for SDK Users Information Disclosure VulnerabilityNoNo4.7

Browser vulnerabilities






































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35618Microsoft Edge (Chromium-based) Elevation of Privilege VulnerabilityNoNo9.6
CVE-2023-36880Microsoft Edge (Chromium-based) Information Disclosure VulnerabilityNoNo4.8
CVE-2023-38174Microsoft Edge (Chromium-based) Information Disclosure VulnerabilityNoNo4.3
CVE-2023-6512Chromium: CVE-2023-6512 Inappropriate implementation in Web Browser UINoNoN/A
CVE-2023-6511Chromium: CVE-2023-6511 Inappropriate implementation in AutofillNoNoN/A
CVE-2023-6510Chromium: CVE-2023-6510 Use after free in Media CaptureNoNoN/A
CVE-2023-6509Chromium: CVE-2023-6509 Use after free in Side Panel SearchNoNoN/A
CVE-2023-6508Chromium: CVE-2023-6508 Use after free in Media StreamNoNoN/A

ESU Windows vulnerabilities












































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36006Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35639Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35641Internet Connection Sharing (ICS) Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35630Internet Connection Sharing (ICS) Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35628Windows MSHTML Platform Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21740Windows Media Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35633Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35632Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36011Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36005Windows Telephony Server Elevation of Privilege VulnerabilityNoNo7.5
CVE-2023-36004Windows DPAPI (Data Protection Application Programming Interface) Spoofing VulnerabilityNoNo7.5
CVE-2023-35622Windows DNS Spoofing VulnerabilityNoNo7.5
CVE-2023-35643DHCP Server Service Information Disclosure VulnerabilityNoNo7.5
CVE-2023-35638DHCP Server Service Denial of Service VulnerabilityNoNo7.5
CVE-2023-35629Microsoft USBHUB 3.0 Device Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2023-35642Internet Connection Sharing (ICS) Denial of Service VulnerabilityNoNo6.5
CVE-2023-36012DHCP Server Service Information Disclosure VulnerabilityNoNo5.3
CVE-2023-20588AMD: CVE-2023-20588 AMD Speculative Leaks Security NoticeNoYesN/A

Microsoft Dynamics vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36020Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2023-35621Microsoft Dynamics 365 Finance and Operations Denial of Service VulnerabilityNoNo7.5

Microsoft Dynamics Azure vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36019Microsoft Power Platform Connector Spoofing VulnerabilityNoNo9.6

Microsoft Office vulnerabilities



































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35636Microsoft Outlook Information Disclosure VulnerabilityNoNo6.5
CVE-2023-36009Microsoft Word Information Disclosure VulnerabilityNoNo5.5
CVE-2023-35619Microsoft Outlook for Mac Spoofing VulnerabilityNoNo5.3

System Center vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36010Microsoft Defender Denial of Service VulnerabilityNoNo7.5

Windows vulnerabilities































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35634Windows Bluetooth Driver Remote Code Execution VulnerabilityNoNo8
CVE-2023-35644Windows Sysmain Service Elevation of PrivilegeNoNo7.8
CVE-2023-36696Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35631Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36391Local Security Authority Subsystem Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36003XAML Diagnostics Elevation of Privilege VulnerabilityNoNo6.7
CVE-2023-35635Windows Kernel Denial of Service VulnerabilityNoNo5.5



Source: Rapid7
Source Link: https://blog.rapid7.com/2023/12/12/patch-tuesday-december-2023/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.